Date: Tue, 23 Dec 2014 21:24:56 +0000 (UTC) From: Eygene Ryabinkin <rea@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r375358 - head/security/vuxml Message-ID: <201412232124.sBNLOunY054602@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: rea Date: Tue Dec 23 21:24:55 2014 New Revision: 375358 URL: https://svnweb.freebsd.org/changeset/ports/375358 QAT: https://qat.redports.org/buildarchive/r375358/ Log: Fix whitespace in entry for ntp (4033d826-87dd-11e4-9079-3c970e169bc2) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Dec 23 21:22:35 2014 (r375357) +++ head/security/vuxml/vuln.xml Tue Dec 23 21:24:55 2014 (r375358) @@ -119,7 +119,7 @@ Notes: be executed. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys.</p> - <p>The buffer overflow vulnerabilities in ntpd may + <p>The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201412232124.sBNLOunY054602>